Wednesday, April 9, 2025
HomeBackdoorRekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

Published on

SIEM as a Service

Follow Us on Google News

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform, as researchers discovered malicious domains mimicking TradingView, suggesting a potential interest in compromising the platform’s user community. 

By analyzing shared SSH keys, investigators identified additional infrastructure linked to this campaign and another open directory, highlighting the evolving tactics employed by APT31 to evade detection and compromise sensitive information.

An open directory at 27.124.45[.]146:9998 exposed two Rekoobe malware binaries, 10-13-x64.bin and 10-13-x86.bin. Both binaries attempted to communicate with the same IP address on port 12345.

- Advertisement - Google News

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

 Open directory page for 27.124.45[.]146

The x64 binary, na.elf, exhibited behavior similar to NoodRAT/Noodle RAT, including process name changes and self-copying to the /tmp/CCCCCCCC directory. While these similarities suggest potential attribution, further analysis is necessary to confirm.

An investigation into backdoor files revealed typosquatting domains mimicking the legitimate TradingView website contained extra “l”s, increasing the risk of accidental user visits. 

While no active webpages were found, the Wayback Machine showed a 404 error for these domains in September 2024, suggesting a potential attempt to exploit financial platforms and their Linux-based user base. 

Wayback machine results for tradingviewll.com

The existence of these domains in conjunction with the Rekoobe backdoor draws attention to the possibility of an infrastructure overlap for the purpose of specifically targeting financial institutions. 

Three IP addresses (27.124.45[.]231, 1.32.253[.]2, and 27.124.45[.]211) were found linked to 27.124.45[.]146 through shared SSH keys, which are likely part of the same operational setup and are hosted in Hong Kong and exhibit similar characteristics, including open directories with identical Python and SimpleHTTP versions and Rekoobe-detected files. 

Open directory contents for 27.124.45[.]211:9998

According to Hunt, 27.124.45[.]211 also hosts Yakit, a cybersecurity tool that could potentially be misused for malicious activities.

The presence of these tools and the shared infrastructure warrant further investigation to assess the potential risks. 

The discovery of the Rekoobe backdoor in an open directory led to the identification of a broader malicious infrastructure, which includes lookalike domains mimicking TradingView and additional servers linked through shared SSH keys. 

Key network observables include IP addresses, ASNs, domains, host countries, and file hashes. A specific IP address (27.124.45.146) hosted the malicious files and shared SSH keys with other IPs, indicating potential coordinated activity.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed

Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super...

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain...

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe has announced critical security updates for several of its popular software products, addressing...

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has...

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video...

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to...